Abstract
The subject security has wide coverage and it is growing with every passing day. As civilization progressed from Agrarian to semi-industrialization, advanced industrialization and finally to present ICT (Information and Communication Technology) age, concerns for security are increasingly taking in all objects from physical to digital. It augmented apprehensions from losing material wealth to most abstract entities like wealth of knowledge in digital form. Today’s technology allows wired and wireless access to tangible and intangible resource-built ups (material to digital), digitally, and steal the same if need arises. The riddle is to defend our own resources from the rapacious hand of ubiquitous computing and communicating technology evolved by us. The art and science of hiding and securing precious resources from possible predators in physical or digital forms make it complex and challenging. The enigma remains in the fact that predator uses same technology and at times also makes rule that prevails over others.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Weiser M (1991) The computer for the 21st century. Scientific American, Sept 1991, pp 94–104
Weiser M, Brown JS (1996) The coming age of calm technology. Xerox PARC, 5 Oct 1996
O’Reilly T, Battelle J. Web squared: web 2.0 five years on; special report
Kleinrock L. Nomadic computing—an opportunity CCR 4/95
Burgin M, Eberbach E (2012) Evolutionary computation and the processes of life. ACM Publication
La Porta TF, Sabnani KK, Gitlin RD. Challenges for nomadic computing: mobility management and wireless communications. Bell Laboratories
Avijit D. Knowledge ubiquity in web 2.0 paradigm. Innovation in information system and technology. ITCDC ‘09 Macmillan Publications, pp 234–238
Avijit D. Digital security: a moving target. Int J Electr Electron Comput Sci Eng. Special issue—TeLMISR 2015. ISSN: 2348-2273
Barcena MB, Wueest C (2015) Insecurity in the Internet of Things. Symantec, security response, version 1.0, 12 March 2015
Symantec, ISTR, April 2015, vol 20
Symantec, Insecurity in Internet of Things, version 1.0, 12 March 2015
Cortada JW, Marc GAMLN How nations thrive in the information age. IBM Institute for Business Value, IBM Global Business Services
Kephart JO, Chess DM (2003) Autonomic computing. IBM Thomas J. Watson Research Center, IEEE Computer Society
https://bensontao.wordpress.com/2013/10/06/vivante-internet-of-things
http://securityaffairs.co/wordpress/34974/cyber-crime/iot-security-symantec.htm
INSEAD (2014) Global information technology report
ITU (2015) Global cyber security index & cyberwellness profile report
Lytinen K, Yoo Y. The next wave of nomadic computing: a research agenda for information systems research. Working papers on information systems, Sprouts. ISSN: 1535-6078
Cousins KC, Robey D. Human agency in a wireless world: patterns of technology use in nomadic computing environments. Information and Organization; Science Direct
Venkatasubramanian K, Gupta SKS (2006) Security solutions for pervasive healthcare. P1: Binaya Dash, 8 Dec 2006, vol 11:58, pp AU7921–AU7921˙C015
Kleinrock L. Nomadic computing. Computer Science Department, Los Angeles
Davis RM. Evolution of computers and computing. Science 195
Satyanarayanan M. Pervasive computing: vision and challenges. School of Computer Science, Carnegie Mellon University
TechTarget, Security Media Group. Information security, October 2014, vol 16, no 8
Acknowledgements
Contributions of theorists who can look into the future and guide science and technologies beyond horizon are deeply acknowledged.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Dutta, A. (2018). Digital Security: An Enigma. In: Bokhari, M., Agrawal, N., Saini, D. (eds) Cyber Security. Advances in Intelligent Systems and Computing, vol 729. Springer, Singapore. https://doi.org/10.1007/978-981-10-8536-9_25
Download citation
DOI: https://doi.org/10.1007/978-981-10-8536-9_25
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-8535-2
Online ISBN: 978-981-10-8536-9
eBook Packages: EngineeringEngineering (R0)